Public sector in the cloud 1 July 2014 The public sector is displaying a newfound openness towards cloud delivery models, believes Andrew Soddy of Mimecast.
Consistent malware protection 1 July 2014 Cisco expands advanced malware protection and data centre security solutions to address advanced threats from endpoint to network to cloud for customers in South Africa.
Business should anticipate greater cloud cover 1 July 2014 A reduction in the cost of data and reliability of data on fixed line and wireless media has driven more widespread use of cloud services.
Hosting in the cloud 1 July 2014 Scalability, flexibility, security and cost saving are just some of the benefits associated with a move from traditional on-premise servers to a cloud-based environment – and the business case for initiating the process is clear and strong.
Security in the cloud 1 July 2014 Panda Security has announced the availability of its new cloud offering, Panda Cloud Fusion, which combines comprehensive security, management and support in one solution.
How hackers are stealing company secrets 1 July 2014, Security Services & Risk Management Common, everyday applications Facebook, YouTube, Flickr etc. can be used to transfer sensitive data out of your organisation with ease.
POPI demands control over mobile data 1 July 2014 The Protection of Personal Information Act (POPI) should prompt a mobile security rethink for SA companies.
Patience is a criminal virtue 1 June 2014 Symantec report reveals the number of mega data breaches went from one in 2012 to eight in 2013; 552 million identities exposed in 2013.
Advanced evasion techniques prove costly 1 May 2014 Research commissioned by McAfee examines the role and cost of advanced evasion techniques in recent high profile data breaches.
When, not if 1 May 2014 Cisco introduces Advanced Malware Protection to protect its 60 million enterprise and commercial users of Web, e-mail and cloud Web security solutions.
On-premise security doesn’t make sense 1 May 2014 Though using separate best-of-breed, on-premise solutions for different security problems remains the dominant approach for deploying IT security, recent research by Osterman Research shows that companies would prefer a single or cloud-based approach.
Effective website security May 2014 Websites have been using SSL technology for years to ensure their security, and the certificates and their uses are well understood. SSL that only protects users at login, however, leaves them vulnerable when they’re spending time on your website.
Keeping data secure April 2014 With the ongoing trend to move data offsite on mobile devices, can we truly find ways of ensuring that this data is secure from prying hands and eyes? And is data security for mobile devices different from that for supposedly office- or home-bound data?
Mobile security from the cloud April 2014 Despite the widely publicised losses resulting from targeted attacks, many SMBs have not taken action to address mobile device security. Research Now found that fewer than half of the enterprises surveyed had implemented a security solution.
Cybersecurity in The Surveillance Age April 2014 Strong encryption guards against data integrity compromises, which are typically treated by network engineers or mobile security experts as hostile and untrustworthy.
New Titanium Backup Appliance April 2014 Attix5, a data protection software and cloud solution provider, has announced the release of the Titanium Appliance, a complete onsite backup and recovery solution preinstalled with Attix5 software.
Protecting critical data April 2014 Quartile Capital ensures sensitive client information is encrypted and secured, by unifying data protection and backup across physical and virtual environments.
POPI is here: start getting compliant April 2014 E-mail security, archiving, and data loss prevention should be high on the agenda for South African companies in 2014 with PoPI around the corner.
Over the NSA spying hype? Don’t be April 2014 Hybrid cloud solutions – a mix of the best services provided by an outside environment and an internal infrastructure – are the latest buzzword. But even as they are touted as a ‘best of both worlds’ solution, they come with their own concerns.